Skip to main content

Illumio Core 25.1 Install, Configure, Upgrade

How to Upload Vulnerability Data

This example tutorial shows how to upload vulnerability data to the PCE. For more information, see Upload Vulnerability Data. The source of the vulnerability data in this example comes from Qualys®.

Goal

Upload authoritative vulnerability data for analysis in Illumination.

Steps
  1. Do a non-authoritative upload of vulnerability data for examination:

    ilo upload_vulnerability_report --input-file C:\Users\albert-einstein0.xml --source-scanner qualys --format xml
  2. Examine a single uploaded vulnerability record identified by its vulnerability identifier, qualys-38173. See Vulnerability Identifier for information.

    ilo vulnerability read --xorg-id=1 --reference-id=qualys-38173
  3. Do another non-authoritative upload of vulnerability data.

    ilo upload_vulnerability_report --input-file C:\Users\albert-einstein99.xml --source-scanner qualys --format xml
  4. Do an authoritative upload of vulnerability data, overwriting any previously uploaded records and adding any new vulnerability records.

    ilo upload_vulnerability_report --input-file C:\Users\albert.einstein_FINAL.xml --authoritative --source-scanner qualys --format xml
Results

The authoritative vulnerability data has been uploaded and is ready for use in Illumination.